Skip to main content

SHIELDGate System Access Guide

SHIELDGate offers four access methods based on isolation browser technology for secure web system access. All access methods may be allowed or restricted according to the administrator's policy.


1. Preparations Before Use

  • Supported Browsers: Chrome, Microsoft Edge
  • Optimal usage environment: It is recommended to use the latest version of the browser.
  • Basic Principles for AccessingAll connections are made through the SHIELDGate isolation browser, and direct connections between the user device and the target system are blocked.

2. Connection Method Guide

2.1 App-Based Access

  • Provide users with a list of work systems (apps) registered in advance by the administrator.
  • After logging in, the user selects the desired system from the list for isolated access.
  • The list of apps displayed may vary for each user according to the policies set by the administrator.
  • Access restrictions or blocking policies may be applied.

Usage Procedure:

  1. Check the list of apps displayed on the user screen after logging in.
  2. Click the app you want to access.
  3. The isolation browser will automatically launch and proceed with the connection.

2.2 Accessing via Direct URL Input

  • Directly enter the full URL of the desired site to access it.
  • Access to the entered URL may be restricted or blocked according to the management policy.

Usage Procedure:

  1. After logging in, enter the site you want to access in the 'URL input field'.
  2. Attempting to access with an isolation browser.
  3. The connection result is allowed or blocked according to the policy.

2.3 App + URL Mixed Method

  • Users can choose their preferred method when entering the app list or URL.
  • Both methods provide the same isolated browser environment.
  • Enhance user accessibility and support various access methods.

Usage Procedure:

  1. Select an app or enter the URL directly after logging in.
  2. Accessing via the isolation browser.
  3. Application of access restrictions according to policy

2.4 PAC Method Connection

  • Set up PAC policy to automatically redirect URLs entered directly in the local browser address bar to the isolated browser.
  • Applicable only to specific URLs registered by the administrator.
  • Automatic secure connection without separate user input is possible.

Usage Procedure:

  1. Enter the site URL you want to access in the browser's address bar.
  2. Automatically switch to isolated browser according to PAC policy.
  3. If the access target is not registered in the policy, it will be accessed through a general browser or blocked.

3. Security Features and Access Control

The SHIELDGate isolation browser provides the following security features:

3.1 User Condition-Based Access Control

  • You can set conditions such as time zone, location (IP), device type, etc.
  • Access restriction or blocking if conditions are not met

3.2 Granular Permission Management by App/URL

  • Access permissions for each system can be set on a user or group basis.
  • Access permissions for specific apps or sites can be granted only to specific users.

3.3 Blocking Harmful Sites

  • Automatic detection and blocking based on the list of harmful sites registered in the security DB.
  • Warning or blocking when the user attempts to access a malicious site.

This policy may vary based on administrator settings, and if a specific access method has been disabled or blocked, you will need to contact the administrator.